Security Guidelines for Your IaaS Provider
Page last updated:
This topic provides security guidelines for the Infrastructure as a Service (IaaS) providers supported by Ops Manager.
Overview
Ops Manager supports a variety of IaaS providers. Different IaaS providers require different configuration steps to secure user data, identity information, and credentials.
Security requirements can vary broadly based on the unique configuration and infrastructure of each organization. Rather than provide specific guidance that may not apply to all use cases, VMware has collected links to IaaS providers’ security and identity management documentation. The documents below may help you understand how your IaaS’ security requirements impact your Ops Manager deployment.
VMware does not endorse these documents for accuracy or guarantee that their contents apply to all Ops Manager installations.
Find your IaaS provider in the list below. The documentation items linked for each IaaS may help you configure and secure your installation infrastructure.
Amazon Web Services (AWS)
These topics in the AWS documentation provide a general reference for AWS’ Identity and Access Management (IAM) features:
AWS Identity and Access Management Guide: If you are new to AWS, start here.
Identities (Users, Groups, and Roles) in the AWS Identity and Access Management Guide
Temporary Security Credentials in the AWS Identity and Access Management Guide: This documentation provides a general definition of IAM terms and provide best practices to help you manage IaaS users and permissions.
Google Cloud Platform (GCP)
This topic in the GCP documentation describes general authentication guidelines for GCP:
Microsoft Azure
This topic in the Microsoft Azure documentation describes managing IaaS users and credentials:
OpenStack
These topics in the OpenStack documentation provide a general reference for OpenStack service credential management:
Configuring service credentials in Configure the deployment
VMware vSphere
This topic in the VMware vSphere documentation describes best practices for securing and managing a vSphere installation: